CFP last date
15 July 2024
Reseach Article

Cracking and Hardening Hidden SSID Mechanism in 802.11 using PYTHON

by Varun Chopra, Sushil Mehra
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 11
Year of Publication: 2014
Authors: Varun Chopra, Sushil Mehra
10.5120/ijais14-451262

Varun Chopra, Sushil Mehra . Cracking and Hardening Hidden SSID Mechanism in 802.11 using PYTHON. International Journal of Applied Information Systems. 7, 11 ( November 2014), 51-55. DOI=10.5120/ijais14-451262

@article{ 10.5120/ijais14-451262,
author = { Varun Chopra, Sushil Mehra },
title = { Cracking and Hardening Hidden SSID Mechanism in 802.11 using PYTHON },
journal = { International Journal of Applied Information Systems },
issue_date = { November 2014 },
volume = { 7 },
number = { 11 },
month = { November },
year = { 2014 },
issn = { 2249-0868 },
pages = { 51-55 },
numpages = {9},
url = { https://www.ijais.org/archives/volume7/number11/700-1262/ },
doi = { 10.5120/ijais14-451262 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T18:55:55.283466+05:30
%A Varun Chopra
%A Sushil Mehra
%T Cracking and Hardening Hidden SSID Mechanism in 802.11 using PYTHON
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 7
%N 11
%P 51-55
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Protocol has become a very important part of modern life. From cell phone to laptops everyone uses Wireless for one purpose or another. Wireless Protocol is commonly known as IEEE 802.11 Cliendard. It Uses Several Frames, Header for its operation. Unfortunately none of these are encrypted and hence can be sniffed and analyzed for exploiting. Due to this plaintext nature of 802.11 packets several protection mechanisms provided by 802.11 become useless such as hidden ssid Mac filtering etc. In this paper, such protection mechanisms are analyzed thoroughly and it is explained how python can be used to defeat this protection schema, it is also shown how python can also be used for hardening these security measures.

References
  1. Introduction to 802.11 Technology – Cisco (http://www.cisco.com/web/TH/assets/docs/seminar/200903_Night_Academy_3_1_WLAN_Introduction.pdf)
  2. IEEE 802.11 Wireless LANs (http://inst.eecs.berkeley.edu/~ee122/sp07/80211.pdf)
  3. IEEE 802.11 frame format - Studio Reti (http://www.studioreti.it/slide/802-11-Frame_E_C.pdf)
  4. Information Embedding in IEEE 802.11 Beacon Frame (http://research.ijcaonline.org/ctngc/number3/ctngc1027.pdf)
  5. An Overview of 802.11 Wireless Network Security Standards (http://www.sans.org/reading-room/whitepapers/wireless/overview-80211-wireless-network-security-standards-mechanisms-1530)
  6. Hands on python-Begginers (http://www.nervenet.org/pdf/python3handson.pdf)
  7. Scapy documentation (!) - SecDev.org (www.secdev.org/projects/scapy/files/scapydoc.pdf)
  8. Packet Crafting Using Scapy-William Zereneh (http://www.scs.ryerson.ca/~zereneh/cn8001/CN8001-PacketCraftingUsingScapy-WilliamZereneh.pdf)
  9. Network packet forgery with Scapy – PacSec (https://pacsec.jp/psj05/psj05-biondi-en.pdf)
Index Terms

Computer Science
Information Sciences

Keywords

Hidden Wifi SSID Scapy 802.11